UPDATED 10:40 EDT / SEPTEMBER 08 2014

What you missed in Cloud: an odd mishmesh of containers and analytics

enterprise cloud infrastructure architectureCloud computing may have settled in as a permanent fixture of the enterprise technology landscape, but the chase for the next big thing is not over by any stretch. The hot new technology making headlines today is containerization, which the industry appears to be embracing even faster than the everything-as-a-service mindset.

Cisco Systems Inc. became the latest big-name vendor to endorse buzzed-about Docker container engine last week after Kenneth Owens, the chief technology officer for its cloud business, revealed that his firm apparently intends to provide support for the project sometime next year. He didn’t offer much in the way of details but indicated that the move is part of  the switching and routing giant’s multibillion-dollar plan to establish a federated network of data centers that will provide interoperable services to customers worldwide. The platform-agnostic nature of containers makes Docker a viable option with that vision.

Another top trend that has been keeping cloud vendors busy this past week is analytics, which Box Inc. made an especially big priority at its close-knit customer conference in San Francisco. The company introduced a new technology called Workflow that groups documents according to properties such as type, file and legal classification and enables admins to create policies for handling files based on those criteria. Invoices, for example, can be automatically sent to the financial department’s folder leveraging the software.

FireEye Inc. is also injecting more analytics into the public cloud with a new release of its Threat Analytics Platform (TAP) unveiled on Wesdensday that provides interagtion with Amazon.com Inc’s market leading infrastructure-as-a-service platform. According to the security vendor, the upgrade enables users to combine data about their cloud deployments with logs from on-premise infrastructure into a complete view of their environments. That visibility can make it easier to spot composite attacks that exploit multiple vulnerabilities throughout the network, FireEye claims.

photo credit: billfrog2 via photopin cc

Since you’re here …

… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.